News & Insights

Understanding “Burner” Phones

In its purest form, a burner phone cannot be traced through any records to any individual or organization. This theoretically allows at least two people to communicate over the cell network “unattributably”.

A true “burner” phone is a device that cannot be traced through any records to an individual or organization. Ideally, these phones are used for communication only with other burner phones for a very short period, after which both devices are securely discarded. This approach theoretically allows people to communicate over cellular networks without attribution—meaning adversaries cannot determine who is talking to whom.
However, obtaining a genuine burner phone has become increasingly difficult. Even when purchasing a cheap prepaid phone with cash, numerous factors can still link you to the device:

  • Store surveillance cameras recording your purchase
  • Adjacent businesses’ cameras capturing your presence
  • ATM records if you withdrew cash nearby
  • Your personal phone’s location data if carried during purchase
  • Modern vehicle tracking systems recording your trip
  • Traffic cameras documenting your travel to the store

These vulnerabilities highlight why simply purchasing a prepaid phone doesn’t automatically create an untraceable communication device. The concept of a truly anonymous burner phone requires extraordinary operational security measures that most people are unlikely to successfully implement.

Challenges in Using Burner Phones Effectively

Even if you manage to purchase a prepaid phone without creating obvious links to your identity, using it securely presents another set of significant challenges. Effective burner phone usage requires meticulous attention to operational security details that most people overlook. Consider these critical questions about burner phone usage:

  1. Initial Activation: Did you leave your normal phone and all personal electronics at home hours before activating the burner? Is leaving electronics at home consistent with your normal behavior patterns?
  2. Location Considerations: Did you only activate and use the burner phone in locations you never visit in your normal life? Could your presence there be documented by cameras or other means?
  3. Parallel Activities: While using the burner, did you engage in any identifiable activities? Using credit cards, appearing on cameras, or using transit cards linked to your identity can compromise anonymity.
  4. Communication Patterns: Did you contact anyone you normally communicate with? Did recipients of your burner communications use their burner phones to contact people in their normal lives?

If you cannot answer all these questions with absolute certainty, the burner phone can potentially be traced back to you. Modern data analytics can connect seemingly disparate information points to establish patterns and identify individuals. Remember that digital data is persistent—records that seem unimportant today might be
analyzed years later by motivated adversaries with advanced capabilities. The complexity of these requirements demonstrates why true burner phone anonymity is extremely difficult to achieve in practice, especially for individuals without specialized training in counterintelligence techniques.

Practical Alternatives to Burner Phones

Given the significant challenges in effectively using burner phones, most protesters should consider more practical approaches to communications security. The first step is creating a personal risk assessment by asking: “What am I trying to protect, from whom, and what capabilities do they have?” For most protesters, the primary concern isn’t concealing their presence at a protest from agencies with nation-state surveillance capabilities (which would require extraordinary measures beyond burner phones). Instead, the typical goal is protecting communication content and minimizing digital exposure during protest activities.

  • Use Signal for Secure Communications: The Signal messaging app provides end-to-end encryption for communications. While it doesn’t hide who you’re talking to from sophisticated adversaries, it effectively protects the content of your messages.
  • Employ Trusted VPN Services: A reputable Virtual Private Network can help shield your internet traffic from surveillance when using public networks, though it won’t prevent cellular networks from tracking your location.
  • Follow Basic Device Security: Keep your phone off and in a Faraday bag until absolutely necessary, following guidelines in our “Electronic Device Security Guide for Protestors” document.

Importantly, using burner phones incorrectly may actually increase your risk profile by drawing unwanted attention. Law enforcement might view the use of burner phones as suspicious behavior warranting additional scrutiny. For most protesters, following basic digital hygiene practices with their regular devices (or leaving all devices at home) is more effective than attempting complex burner phone operations.